Visible to the public DDoS attack detection approach using an efficient cluster analysis in large data scale

TitleDDoS attack detection approach using an efficient cluster analysis in large data scale
Publication TypeConference Paper
Year of Publication2017
AuthorsBhaya, W., EbadyManaa, M.
Conference Name2017 Annual Conference on New Trends in Information Communications Technology Applications (NTICT)
PublisherIEEE
ISBN Number978-1-5386-2962-8
KeywordsCAIDA2007 datasets, CAIDA2008 datasets, cluster analysis, clustering, Clustering algorithms, clustering using representative, composability, Computer crime, computer network security, congestion-based attack, CURE, DARPA2000 datasets, data mining, DDoS attack detection, detection rate, Distributed Denial of Service (DDoS), distributed denial of service attack, Entropy, F measure, false alarm rate, flooding attack packets, genuine network flow identification, host-based resources, Human Behavior, Intrusion detection, intrusion detection system, large data scale, legitimate users, Metrics, network resources, Network security, packets windowing, pattern clustering, Phi coefficient, pubcrawl, Resiliency, resource allocation, Shape, unsupervised data mining, Wireless sensor networks
Abstract

Distributed Denial of Service (DDoS) attack is a congestion-based attack that makes both the network and host-based resources unavailable for legitimate users, sending flooding attack packets to the victim's resources. The non-existence of predefined rules to correctly identify the genuine network flow made the task of DDoS attack detection very difficult. In this paper, a combination of unsupervised data mining techniques as intrusion detection system are introduced. The entropy concept in term of windowing the incoming packets is applied with data mining technique using Clustering Using Representative (CURE) as cluster analysis to detect the DDoS attack in network flow. The data is mainly collected from DARPA2000, CAIDA2007 and CAIDA2008 datasets. The proposed approach has been evaluated and compared with several existing approaches in terms of accuracy, false alarm rate, detection rate, F. measure and Phi coefficient. Results indicates the superiority of the proposed approach with four out five detected phases, more than 99% accuracy rate 96.29% detection rate, around 0% false alarm rate 97.98% F-measure, and 97.98% Phi coefficient.

URLhttps://ieeexplore.ieee.org/document/7976110
DOI10.1109/NTICT.2017.7976110
Citation Keybhaya_ddos_2017